Trust
Security posture
Cyber Health Score is architected around tenant isolation, audited access, and least-privilege operations. This page summarises principles — not an auditor-ready attestation.
Tenant isolation
Tenant data is scoped server-side using organisation membership. Tenant administrators control who can invite users, configure scheduled scanning, and grant time-limited internal support access.
Credentials and sessions
Authentication uses secure cookies and secrets configured in your deployment environment. Operators should follow organisational password and device policies when using the tenant workspace.
Responsible scanning
Posture scans run only against verified assets your organisation owns. Passive discovery avoids aggressive probing by design; advanced checks remain policy-gated.
Questions? Contact us or read the Trust centre.